The implementation phase of the software life cycle includes the elements that are required to keep the software running smoothly.

False

When repackaging an application is not an option and a Windows Installer file is not available, you can use a .zap file to publish an application.

True

The Assign option allows users to install the applications that they consider useful to them.

False

When configuring Software Restriction Policies, the Disallowed option allows all applications to run except those that are specifically excluded.

False

The Disallowed Default Security Level should be used cautiously because all applications will be restricted unless explicitly allowed.

True

What process takes place from the time an application is evaluated for deployment in an organization until the time when it is deemed old or not suitable for use?

software life cycle

Which of the following is not a phase of the software life cycle?

evaluation

Microsoft Windows Server 2008 uses the Windows Installer with Group Policy to install and manage software that is packaged into what type of file?

.msi

Modifications to .msi files require transform files, which have the __________ extension.

.mst

__________ files are used to apply service packs and hotfixes to installed software.

Patch

Before deploying software using Group Policy, what must you create?

distribution share

What option allows users to install the applications that they consider useful to them?

Publish

What option is helpful when you are deploying required applications to pertinent users and computers?

Assign

What allows published applications to be organized within specific groupings for easy navigation?

software categories

What policies are designed to identify software and control its execution?

Software Restriction

When configuring Software Restriction policies, which option prevents any application from running that requires administrative rights, but allows programs to run that only require resources that are accessible by normal users?

Basic User

By default, the Software Restriction Policies area has what value in the Default Security Level setting?

Unrestricted

Which of the following is a software restriction rule that can be used to govern which programs can or cannot run on your network?

all of the above

hash rules, certificate rules, path rules, and network zone rules.

What is a series of bytes with a fixed length that uniquely identifies a program or file?

hash

What identifies software by specifying the directory path where the application is stored in the file system?

path rule

What type of rule can be applied to allow only Windows Installer packages to be installed if they come from a trusted area of the network?

What Software Restriction Policy properties allow you to determine whether the policies apply to all files or whether library files, such as Dynamic Link Library (DLL), are excluded?

enforcement

What Software Restriction Policy properties allow an administrator to control how certificate rules are handled?

trusted publishers

What type of file can be written to allow non–Windows Installer–compliant applications to be deployed?

.zap

The software life cycle is a derivative of the System __________ Life Cycle.

Development

The __________ phase is the final phase before the software life cycle begins again with a new software deployment plan.

removal

A(n) __________ file is a relational database file that is copied to the target computer system with the program files it deploys.

.msi

Before deploying software using Group Policy, you must create a(n) __________ share.

distribution

If you use the __________ option, you must also decide whether you will assign the application to a computer or a user account.

Assign

Use the __________ option to provide all installation messages and screens for users during the installation of all packages in the GPO.

Maximum

When customizing software installation packages, use the __________ tab to specify the transform (.mst) files or patch (.msp) files that are to be applied to the package.

Modifications

The Software __________ Policies node is found in the Windows Settings\Security Settings\ node of the User Configuration or the Computer Configuration node of a Group Policy.

Restriction

A hash is computed by a hash __________, which in effect creates a fingerprint of the file.

algorithm

A(n) __________ rule identifies software by specifying the directory path where the application is stored in the file system.

path

What is the client-side component of Windows Installer?

Windows Installer Service

When repackaging an application is not an option and a Windows Installer file is not available, what type of file can be used to publish an application?

.zap file

What allows published applications to be organized within specific groupings for easy navigation?

software categories

What is designed to identify software and control its execution?

Software Restriction Policies

When configuring Software Restriction Policies, what option prevents any application from running that requires administrative rights, but allows programs to run that only require resources that are accessible by normal users?

Basic User

What is generated by a formula that makes it nearly impossible for another program to have the same hash?

hash value

What can be used to allow software from a trusted source to run or prevent software that does not come from a trusted source from running?

certificate rule

What rules apply only to Windows Installer packages that attempt to install from a specified zone such as a local computer, local intranet, trusted sites, restricted sites, or the Internet?

network zone rules

What are the four stages of the software life cycle?

planning, implementation, maintenance, and removal

What two methods can be used to install software with Group Policy when no .msi file exists?

You can repackage the original installation file or create a .zap file.

What is an .msi file?

An .msi file is a relational database file that is copied to the target computer system with the program files it deploys. In addition to providing installation information, this database file assists in the self-healing process for damaged applications and clean application removal.

What two options exist when choosing how to deploy software with Group Policy?

Assign and Publish.

What are Software Restriction Policies?

Software Restriction Policies are designed to identify software and control its execution.

What are the three basic strategies for enforcing software restrictions?

Unrestricted, Disallowed, and Basic User

What four types of software restriction rules can be used to govern which programs can run on your network?